Network coding has been shown to achieve optimal multicast throughput, yet at an expensive computation
cost: every node in the network has to code. Interested in minimizing resource consumption of network
coding while maintaining its performance, in this paper, we propose a practical network coder placement
algorithm which achieves comparable content distribution time as network coding, and at the same time,
substantially reduces the number of network coders compared to a full network coding solution in which all
peers have to encode, i.e. become encoders. Our algorithm is derived from two key elements. First, it is
based on the insight that coding at upstream peers eliminates information duplication to downstream peers,
which results in efficient content distribution. Second, our placement strategy exploits centrality
characteristics of the network topology to quickly determine key positions to place encoders. Performance
evaluation using various topology and algorithm parameters confirms the effectiveness of our proposed
method.
Adaptive resource allocation and internet traffic engineering on data networkcsandit
This research paper describes the issues of bandwidth allocation, optimum capacity allocation,network operational cost reduction, and improve Internet user experience. Traffic engineering (TE) is used to manipulate network traffic to achieve certain requirements and meets certain
needs. TE becomes one of the most important building blocks in the design of the Internet backbone infrastructure. Research objective: efficient allocation of bandwidth across multiple paths. Optimum path selection. Minimize network traffic delays and maximize bandwidth utilization over multiple network paths. The bandwidth allocation is performed proportionally over multiple paths based on the path capacity.
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...IDES Editor
Routing in mobile networks is a multiobjective
optimization problem. The problem needs to consider multiple
objectives simultaneously such as Quality of Service
parameters, delay and cost. This paper uses the NSGA-II
multiobjectve genetic algorithm to solve the dynamic shortest
path routing problem in mobile networks and proposes a
framework for real-time software implementation.
Simulations confirm a good quality of solution (route
optimality) and a high rate of convergence.
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETEditor IJCATR
A lot of research has been done on different coding techniques and benefits of their use in wired networks Since
network coding was raised as a basic method for increasing network outpouring and reaching the capacity of
networks. However, wireless networks are suffering from low operating power as the use of NC concept in
MANET principally improves throughput rate in the wireless network .
The delay can be considered as an important parameter in networks and system delayed is not acceptable in
these networks. However, the acceptable delay depends on the application although the efficiency and
throughput leads to an increase in network coding , a reduction in bandwidth consumption, and a delay in
sending packets is reduced by using network coding. In this study, a method is proposed for coding in the
MANET, decreasing the number of sent packets, leading to a reduction in that dela
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsIDES Editor
In this paper we explore the area of congestion
avoidance in computer networks. We provide a brief overview
of the current state of the art in congestion avoidance and also
list our extension to the TCP congestion avoidance mechanism.
This extension was previously published on an international
forum and in this paper we describe an improved version which
allows multiprotocol support. We list preliminary results
carried out in a simulation environment.
New introduced approach called Advanced Notification
Congestion System (ACNS) allows TCP flows prioritization
based on the TCP flow age and priority carried in the header
of the network layer protocol. The aim of this approach is to
provide more bandwidth for young and high prioritized TCP
flows by means of penalizing old greedy flows with a low
priority. Using ACNS, substantial network performance
increase can be achieved.
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P SystemIDES Editor
Kademlia is a structured peer-to-peer (P2P)
application level network, which implements a distributed
hash table (DHT). Its key-value storage and lookup service is
made efficient and reliable by its well-designed binary tree
topology and dense mesh of connections between participant
nodes. While it can carry out data storage and retrieval in
logarithmic time if the key assigned to the value in question
is precisely known, no complex queries of any kind are
supported. In this article a broadcast algorithm for the
Kademlia network is presented, which can be used to
implement such queries. The replication scheme utilized is
compatible with the lookup algorithm of Kademlia, and it
uses the same routing tables. The reliability (coverage) of the
algorithm is increased by assigning the responsibility of
disseminating the broadcast message to many nodes at the
same time. The article presents a model validated with
simulation as well. The model can be used by nodes at runtime
to calculate the required level of replication for any desired
level of coverage. This calculation can take node churn, packet
loss ratio and the size of the overlay into account.
In remote sensor arrange messages are exchanged between the different source and goal matches agreeably such way that multi-jump parcel transmission is utilized. These information bundles are exchanged from the middle of the road hub to sink hub by sending a parcel to goal hubs. Where each hub overhears transmission close neighbor hub. To dodge this we propose novel approach with proficient steering convention i.e. most brief way directing and conveyed hub steering calculation. Proposed work additionally concentrates on Automatic Repeat Request and Deterministic Network coding. We spread this work by the end to end message encoding instrument. To upgrade hub security match shrewd key era is utilized, in which combined conveying hub is allocated with combine key to making secure correspondence. End to end. We dissect both single and numerous hubs and look at basic ARQ and deterministic system coding as strategies for transmission.
In the last decade Peer to Peer technology has been thoroughly explored, becauseit overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner.
We present proofs of our algorithms as well as experimental results and evaluations.
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERINGIJCNCJournal
One of the important issues in the routing protocol design in Wireless Sensor Networks (WSNs) is
minimizing energy consumption and maximizing network lift time. Nowadays networks and information
systems are one of the main parts of modern life that without them, people cannot live. On the hand, the
impairment of these networks leads to great and incalculable costs. In this paper, a new method based on
clustering has presented that problem of energy consumption is solved. The proposed algorithm is that
energy-based clustering can create clusters of the same energy level and distribute energy efficiency across
the WNS nodes. This proposed clustering protocol classify network nodes based on energy and
neighbourhood criteria and attempts to better balance energy in clusters and ultimately increase network
lifetime and maintain network coverage. Results are shown that the proposed algorithm is on average 40%
better than LEACH algorithm and 14% better than IBLEACH algorithm
Adaptive resource allocation and internet traffic engineering on data networkcsandit
This research paper describes the issues of bandwidth allocation, optimum capacity allocation,network operational cost reduction, and improve Internet user experience. Traffic engineering (TE) is used to manipulate network traffic to achieve certain requirements and meets certain
needs. TE becomes one of the most important building blocks in the design of the Internet backbone infrastructure. Research objective: efficient allocation of bandwidth across multiple paths. Optimum path selection. Minimize network traffic delays and maximize bandwidth utilization over multiple network paths. The bandwidth allocation is performed proportionally over multiple paths based on the path capacity.
A Real Time Framework of Multiobjective Genetic Algorithm for Routing in Mobi...IDES Editor
Routing in mobile networks is a multiobjective
optimization problem. The problem needs to consider multiple
objectives simultaneously such as Quality of Service
parameters, delay and cost. This paper uses the NSGA-II
multiobjectve genetic algorithm to solve the dynamic shortest
path routing problem in mobile networks and proposes a
framework for real-time software implementation.
Simulations confirm a good quality of solution (route
optimality) and a high rate of convergence.
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETEditor IJCATR
A lot of research has been done on different coding techniques and benefits of their use in wired networks Since
network coding was raised as a basic method for increasing network outpouring and reaching the capacity of
networks. However, wireless networks are suffering from low operating power as the use of NC concept in
MANET principally improves throughput rate in the wireless network .
The delay can be considered as an important parameter in networks and system delayed is not acceptable in
these networks. However, the acceptable delay depends on the application although the efficiency and
throughput leads to an increase in network coding , a reduction in bandwidth consumption, and a delay in
sending packets is reduced by using network coding. In this study, a method is proposed for coding in the
MANET, decreasing the number of sent packets, leading to a reduction in that dela
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsIDES Editor
In this paper we explore the area of congestion
avoidance in computer networks. We provide a brief overview
of the current state of the art in congestion avoidance and also
list our extension to the TCP congestion avoidance mechanism.
This extension was previously published on an international
forum and in this paper we describe an improved version which
allows multiprotocol support. We list preliminary results
carried out in a simulation environment.
New introduced approach called Advanced Notification
Congestion System (ACNS) allows TCP flows prioritization
based on the TCP flow age and priority carried in the header
of the network layer protocol. The aim of this approach is to
provide more bandwidth for young and high prioritized TCP
flows by means of penalizing old greedy flows with a low
priority. Using ACNS, substantial network performance
increase can be achieved.
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P SystemIDES Editor
Kademlia is a structured peer-to-peer (P2P)
application level network, which implements a distributed
hash table (DHT). Its key-value storage and lookup service is
made efficient and reliable by its well-designed binary tree
topology and dense mesh of connections between participant
nodes. While it can carry out data storage and retrieval in
logarithmic time if the key assigned to the value in question
is precisely known, no complex queries of any kind are
supported. In this article a broadcast algorithm for the
Kademlia network is presented, which can be used to
implement such queries. The replication scheme utilized is
compatible with the lookup algorithm of Kademlia, and it
uses the same routing tables. The reliability (coverage) of the
algorithm is increased by assigning the responsibility of
disseminating the broadcast message to many nodes at the
same time. The article presents a model validated with
simulation as well. The model can be used by nodes at runtime
to calculate the required level of replication for any desired
level of coverage. This calculation can take node churn, packet
loss ratio and the size of the overlay into account.
In remote sensor arrange messages are exchanged between the different source and goal matches agreeably such way that multi-jump parcel transmission is utilized. These information bundles are exchanged from the middle of the road hub to sink hub by sending a parcel to goal hubs. Where each hub overhears transmission close neighbor hub. To dodge this we propose novel approach with proficient steering convention i.e. most brief way directing and conveyed hub steering calculation. Proposed work additionally concentrates on Automatic Repeat Request and Deterministic Network coding. We spread this work by the end to end message encoding instrument. To upgrade hub security match shrewd key era is utilized, in which combined conveying hub is allocated with combine key to making secure correspondence. End to end. We dissect both single and numerous hubs and look at basic ARQ and deterministic system coding as strategies for transmission.
In the last decade Peer to Peer technology has been thoroughly explored, becauseit overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner.
We present proofs of our algorithms as well as experimental results and evaluations.
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERINGIJCNCJournal
One of the important issues in the routing protocol design in Wireless Sensor Networks (WSNs) is
minimizing energy consumption and maximizing network lift time. Nowadays networks and information
systems are one of the main parts of modern life that without them, people cannot live. On the hand, the
impairment of these networks leads to great and incalculable costs. In this paper, a new method based on
clustering has presented that problem of energy consumption is solved. The proposed algorithm is that
energy-based clustering can create clusters of the same energy level and distribute energy efficiency across
the WNS nodes. This proposed clustering protocol classify network nodes based on energy and
neighbourhood criteria and attempts to better balance energy in clusters and ultimately increase network
lifetime and maintain network coverage. Results are shown that the proposed algorithm is on average 40%
better than LEACH algorithm and 14% better than IBLEACH algorithm
Wireless Mesh Network rose as a promising innovation for providing quick and productive communication for which numerous algorithms have been proposed in networking infrastructure. For routing there are various performance parameters such as throughput, network congestion, resiliency, fairness, robustness, network jitter, delay, stability, optimality, simplicity, completeness etc. Robustness provides the capability to deal with all the failures that come across during the connection in the network to increase the network performance. In this paper we have studied and analyzed three algorithms namely on robustness parameter Resilient multicasting [2], Resilient Opportunistic Mesh Routing for Wireless Mesh Network (ROMER) [3], and Buffer Based Routing (BBR) [4], in Wireless Mesh Networks. Analysis through various parameters such as network congestion, network throughput and resiliency [5], shows network performance of BBR is better.
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS ijp2p
Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct
communication and collaboration between nodes. There are three main families of P2P networks: the
centralized architecture, the decentralized architecture that can be structured or unstructured and the
hybrid architecture. Today, there are several implementations for structured decentralized architectures.
This implies that the insertion and search algorithms are different. Among them we have; Chord, Pastry,
Kademlia, CAN(Content Addressable Network) . The choice of these DHTs (Distributed Hash Table) for an
application is made on the basis of their performances. Studies of each of these DHTs mentioned have been
done, proving their performance. But a comparative study of the four DHTs Chord, Pastry, CAN, Kademlia
has not been clearly addressed by previous works. In this paper, we have conducted a comparative
theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. Then, by simulation, we have evaluated the
performances in terms of latency, number of hops and number of transmitted messages. Our study clearly
shows the differences between mathematically established performance and actual performance in an
environment with less restriction. This analysis was made from the data obtained by using the simple
network layer of the PeerfactSim simulator. This simulator abstracts the different network layers, which
gives the advantage of testing the performances with reasonable accuracy. The use of the single network
layer can be considered an ideal case because the node searches are done locally
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...ijp2p
The growth of the Internet technology enables us to use network applications for streaming audio and
video.Especially, real-time streaming services using peer-to-peer (P2P) technology are currently
emerging.An important issue on P2P streaming is how to construct a logical network (overlay network) on
a physical network (IP network). In this paper, we propose an initial peer configuration algorithm for a
multi-streaming peer-to-peer network. The proposed algorithm is based on a mesh-pull approach where
any node has multiple parent and child nodes as neighboring nodes, and content transmitted between these
neighboring nodes depends on their parent-child relationships. Our simulation experiments show that the
proposed algorithm improves the number of joining node and traffic load.
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSijp2p
Peer-to-Peer systems form logical overlay networks on top of the Internet. Essentially, peers randomly
choose logical neighbours without any knowledge about underlying physical topology. This may cause
inefficient communications among peers. This topology mismatch problem may result in poor
performance and scalability for Peer-to-Peer systems. A possible way to improve the performance of
Peer-to-Peer systems is the overlay network construction based on the knowledge of the physical network
topology. In this paper, we will propose the use of the “Record Route” and “Timestamp” options
supported in the IP protocol to explore the paths between peers. By the topology-aware peer selection,
our approach outperforms traditional P2P systems using random peer selection. Our approach only
incurs a low overhead and can be deployed easily in various P2P systems.
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...csandit
In the last decade Peer to Peer technology has been thoroughly explored, because it overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
this paper they introduced UWMAC, a transmitter-based CDMA MAC protocol for UWASNs that integrates a new closed-loop distributed algorithm to establish the optimum transmit power and code length to decrease the near-far impact. UW-MAC objective is to obtain three goals i.e. low channel access delay, high network throughput and low energy consumption. It is shown that UW-MAC maintains to simultaneously obtain limited channel access delay, high network throughput and low energy consumption in deep water communications, which are not critically influenced by multipath. Fatma Bouabdallah and Raouf Boutaba suggested UW-OFDMAC, a distributed Medium Access Control (MAC) protocol which
Survey on Routing in Opportunistic Networks
this paper basically overviews and disused those potential methods and Techniques to select next hop to forward the packets (message) to destination.
AOTO: Adaptive overlay topology optimization in unstructured P2P systemsZhenyun Zhuang
IEEE GLOBECOM 2003
Peer-to-Peer (P2P) systems are self-organized and
decentralized. However, the mechanism of a peer randomly
joining and leaving a P2P network causes topology mismatch-
ing between the P2P logical overlay network and the physical
underlying network. The topology mismatching problem brings
great stress on the Internet infrastructure and seriously limits
the performance gain from various search or routing tech-
niques. We propose the Adaptive Overlay Topology Optimiza-
tion (AOTO) technique, an algorithm of building an overlay
multicast tree among each source node and its direct logical
neighbors so as to alleviate the mismatching problem by choos-
ing closer nodes as logical neighbors, while providing a larger
query coverage range. AOTO is scalable and completely dis-
tributed in the sense that it does not require global knowledge
of the whole overlay network when each node is optimizing the
organization of its logical neighbors. The simulation shows that
AOTO can effectively solve the mismatching problem and re-
duce more than 55% of the traffic generated by the P2P system itself.
Congestion is said to occur in the network when the resource demands exceed the capacity and packets are lost due to too much queuing in the network. During congestion, the network throughput may drop to zero and the path delay may become very high. A congestion control scheme helps the network to recover from the congestion state. In fact, security plays a vital role in Wireless Ad hoc network. This paper presents a systematic literature review to provide comprehensive and unbiased information about various current model Congestion Control conceptions, proposals, problems and solutions in Ad hoc for safety transportation. For this purpose, a total of 33 articles related to the security model in Congestion Control published between 2008 and 2013 were extracted from the most relevant scientific sources (IEEE Computer Society, ACM Digital Library, Springer Link and Science Direct). However, 18 articles were eventually analyzed due to several reasons such as relevancy and comprehensiveness of discussion presented in the articles. Using the systematic method of review, this paper succeeds to reveal the main security threats and Error control, challenges for security, security requirement in Congestion Control in Wireless Ad hoc network (CCWAN) and future research within this scope.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Reducing the Peak to Average Power Ratio of Mimo-Ofdm SystemsIJCNCJournal
In this paper, we proposed a particle swarm optimization (PSO) based partial transmit sequence (PTS)
technique in order to achieve the lowest Peak-to-Average Power Ratio(PAPR) in Multiple Input Multiple
Output- Orthogonal Frequency Division Multiplexing (MIMO-OFDM) systems. Our approach consist of
applying the PSO based PTS on each antenna of the system in order to find the optimal phase factors,
which is a straightforward method to get the minimum PAPR in such a system. The simulation results
demonstrate that the PSO based PTS algorithm when applied to MIMO-OFDM systems with a wide range
of phase factors, tends to give a high performance. In addition, there is no need to increase the number of
particles of the PSO algorithm to enhance the performance of the system. As a result of this, the complexity
of finding the minimum PAPR is kept at a reasonable level.
Mesh pull backup parent pools for video-on-demand multicast treesIJCNCJournal
Resilient multicast is a challenging issue for overlay trees particularly because of high churn. In this work,
we propose a mechanism that allows scalable video multicast. While the regular operation involves treepush
of the video, any node that looses its parent on the tree solicits video from a predetermined backup set
of nodes in a mesh-pull fashion. The main idea is to allocate less bandwidth for backup to improve
bandwidth utilization while maintaining the best possible video quality. The choice of essential design
parameters are studied together with seamlessness of the streaming under variety of fault scenarios.
Simulation results indicate the optimality of the proposed approach as far as resiliency, bandwidth
utilization, delay and video quality are concerned.
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGIJCNCJournal
The rapid growth of users on the cloud service and number of services to the user increases the load on the
servers at cloud datacenter. This issue is becoming a challenge for the researchers. And requires used
effectively a load balancing technique not only to balance the resources for servers but also reduce the
negative impact to the end-user service. The current, load balancing techniques have solved the various
problems such as: (i) load balancing after a server was overloaded; (ii) load balancing and load forecast
for the allocation of resources; iii) improving the parameters affecting to load balancing in cloud. The
study of improving these parameters have great significance to improving system performance through
load balancing. From there, we can propose more effective methods of load balancing, in order to increase
system performance. Therefore, in this paper we researched some parameters affecting the performance
load balancing on the cloud computing.
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
MANET is a temporary connection of mobile nodes via wireless links having no centralized base station.
We developed a protocol with an enhanced route discovery mechanism that avoids the pre-transmission
delay. When a source node wants to communicate with another node, it broadcast RREQ. EAODV give
priority to the source node of real time transmission. When RREQ packet send to neighbor node, for real
time transmission it accept route request on priority basis and the drop ratio of packets decreased, then
throughput increases by receiving more packets at destination and delivery ratio also increased through
these QOS improved.
Qos group based optimal retransmission medium access protocol for wireless se...IJCNCJournal
This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is
designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, shortrange,
low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture,
industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide
autonomous Quality of Service (QoS) to the sensor nodes in one-hop QoS retransmission group and two
QoS groups in WSNs where the source nodes do not have receiver circuits. Hence, they can only transmit
data to a sink node, but cannot receive any control signals from the sink node. The proposed protocol
GORMA provides QoS to the nodes which work independently on predefined time by allowing them to
transmit each packet an optimal number of times within a given period. Our simulation results shows that
the performance of GORMA protocol, which maximize the delivery probability of one-hop QoS group and
two QoS groups and minimize the energy consumption.
Wireless Mesh Network rose as a promising innovation for providing quick and productive communication for which numerous algorithms have been proposed in networking infrastructure. For routing there are various performance parameters such as throughput, network congestion, resiliency, fairness, robustness, network jitter, delay, stability, optimality, simplicity, completeness etc. Robustness provides the capability to deal with all the failures that come across during the connection in the network to increase the network performance. In this paper we have studied and analyzed three algorithms namely on robustness parameter Resilient multicasting [2], Resilient Opportunistic Mesh Routing for Wireless Mesh Network (ROMER) [3], and Buffer Based Routing (BBR) [4], in Wireless Mesh Networks. Analysis through various parameters such as network congestion, network throughput and resiliency [5], shows network performance of BBR is better.
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS ijp2p
Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct
communication and collaboration between nodes. There are three main families of P2P networks: the
centralized architecture, the decentralized architecture that can be structured or unstructured and the
hybrid architecture. Today, there are several implementations for structured decentralized architectures.
This implies that the insertion and search algorithms are different. Among them we have; Chord, Pastry,
Kademlia, CAN(Content Addressable Network) . The choice of these DHTs (Distributed Hash Table) for an
application is made on the basis of their performances. Studies of each of these DHTs mentioned have been
done, proving their performance. But a comparative study of the four DHTs Chord, Pastry, CAN, Kademlia
has not been clearly addressed by previous works. In this paper, we have conducted a comparative
theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. Then, by simulation, we have evaluated the
performances in terms of latency, number of hops and number of transmitted messages. Our study clearly
shows the differences between mathematically established performance and actual performance in an
environment with less restriction. This analysis was made from the data obtained by using the simple
network layer of the PeerfactSim simulator. This simulator abstracts the different network layers, which
gives the advantage of testing the performances with reasonable accuracy. The use of the single network
layer can be considered an ideal case because the node searches are done locally
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...ijp2p
The growth of the Internet technology enables us to use network applications for streaming audio and
video.Especially, real-time streaming services using peer-to-peer (P2P) technology are currently
emerging.An important issue on P2P streaming is how to construct a logical network (overlay network) on
a physical network (IP network). In this paper, we propose an initial peer configuration algorithm for a
multi-streaming peer-to-peer network. The proposed algorithm is based on a mesh-pull approach where
any node has multiple parent and child nodes as neighboring nodes, and content transmitted between these
neighboring nodes depends on their parent-child relationships. Our simulation experiments show that the
proposed algorithm improves the number of joining node and traffic load.
EFFECTIVE TOPOLOGY-AWARE PEER SELECTION IN UNSTRUCTURED PEER-TO-PEER SYSTEMSijp2p
Peer-to-Peer systems form logical overlay networks on top of the Internet. Essentially, peers randomly
choose logical neighbours without any knowledge about underlying physical topology. This may cause
inefficient communications among peers. This topology mismatch problem may result in poor
performance and scalability for Peer-to-Peer systems. A possible way to improve the performance of
Peer-to-Peer systems is the overlay network construction based on the knowledge of the physical network
topology. In this paper, we will propose the use of the “Record Route” and “Timestamp” options
supported in the IP protocol to explore the paths between peers. By the topology-aware peer selection,
our approach outperforms traditional P2P systems using random peer selection. Our approach only
incurs a low overhead and can be deployed easily in various P2P systems.
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...csandit
In the last decade Peer to Peer technology has been thoroughly explored, because it overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
this paper they introduced UWMAC, a transmitter-based CDMA MAC protocol for UWASNs that integrates a new closed-loop distributed algorithm to establish the optimum transmit power and code length to decrease the near-far impact. UW-MAC objective is to obtain three goals i.e. low channel access delay, high network throughput and low energy consumption. It is shown that UW-MAC maintains to simultaneously obtain limited channel access delay, high network throughput and low energy consumption in deep water communications, which are not critically influenced by multipath. Fatma Bouabdallah and Raouf Boutaba suggested UW-OFDMAC, a distributed Medium Access Control (MAC) protocol which
Survey on Routing in Opportunistic Networks
this paper basically overviews and disused those potential methods and Techniques to select next hop to forward the packets (message) to destination.
AOTO: Adaptive overlay topology optimization in unstructured P2P systemsZhenyun Zhuang
IEEE GLOBECOM 2003
Peer-to-Peer (P2P) systems are self-organized and
decentralized. However, the mechanism of a peer randomly
joining and leaving a P2P network causes topology mismatch-
ing between the P2P logical overlay network and the physical
underlying network. The topology mismatching problem brings
great stress on the Internet infrastructure and seriously limits
the performance gain from various search or routing tech-
niques. We propose the Adaptive Overlay Topology Optimiza-
tion (AOTO) technique, an algorithm of building an overlay
multicast tree among each source node and its direct logical
neighbors so as to alleviate the mismatching problem by choos-
ing closer nodes as logical neighbors, while providing a larger
query coverage range. AOTO is scalable and completely dis-
tributed in the sense that it does not require global knowledge
of the whole overlay network when each node is optimizing the
organization of its logical neighbors. The simulation shows that
AOTO can effectively solve the mismatching problem and re-
duce more than 55% of the traffic generated by the P2P system itself.
Congestion is said to occur in the network when the resource demands exceed the capacity and packets are lost due to too much queuing in the network. During congestion, the network throughput may drop to zero and the path delay may become very high. A congestion control scheme helps the network to recover from the congestion state. In fact, security plays a vital role in Wireless Ad hoc network. This paper presents a systematic literature review to provide comprehensive and unbiased information about various current model Congestion Control conceptions, proposals, problems and solutions in Ad hoc for safety transportation. For this purpose, a total of 33 articles related to the security model in Congestion Control published between 2008 and 2013 were extracted from the most relevant scientific sources (IEEE Computer Society, ACM Digital Library, Springer Link and Science Direct). However, 18 articles were eventually analyzed due to several reasons such as relevancy and comprehensiveness of discussion presented in the articles. Using the systematic method of review, this paper succeeds to reveal the main security threats and Error control, challenges for security, security requirement in Congestion Control in Wireless Ad hoc network (CCWAN) and future research within this scope.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Reducing the Peak to Average Power Ratio of Mimo-Ofdm SystemsIJCNCJournal
In this paper, we proposed a particle swarm optimization (PSO) based partial transmit sequence (PTS)
technique in order to achieve the lowest Peak-to-Average Power Ratio(PAPR) in Multiple Input Multiple
Output- Orthogonal Frequency Division Multiplexing (MIMO-OFDM) systems. Our approach consist of
applying the PSO based PTS on each antenna of the system in order to find the optimal phase factors,
which is a straightforward method to get the minimum PAPR in such a system. The simulation results
demonstrate that the PSO based PTS algorithm when applied to MIMO-OFDM systems with a wide range
of phase factors, tends to give a high performance. In addition, there is no need to increase the number of
particles of the PSO algorithm to enhance the performance of the system. As a result of this, the complexity
of finding the minimum PAPR is kept at a reasonable level.
Mesh pull backup parent pools for video-on-demand multicast treesIJCNCJournal
Resilient multicast is a challenging issue for overlay trees particularly because of high churn. In this work,
we propose a mechanism that allows scalable video multicast. While the regular operation involves treepush
of the video, any node that looses its parent on the tree solicits video from a predetermined backup set
of nodes in a mesh-pull fashion. The main idea is to allocate less bandwidth for backup to improve
bandwidth utilization while maintaining the best possible video quality. The choice of essential design
parameters are studied together with seamlessness of the streaming under variety of fault scenarios.
Simulation results indicate the optimality of the proposed approach as far as resiliency, bandwidth
utilization, delay and video quality are concerned.
STUDY THE EFFECT OF PARAMETERS TO LOAD BALANCING IN CLOUD COMPUTINGIJCNCJournal
The rapid growth of users on the cloud service and number of services to the user increases the load on the
servers at cloud datacenter. This issue is becoming a challenge for the researchers. And requires used
effectively a load balancing technique not only to balance the resources for servers but also reduce the
negative impact to the end-user service. The current, load balancing techniques have solved the various
problems such as: (i) load balancing after a server was overloaded; (ii) load balancing and load forecast
for the allocation of resources; iii) improving the parameters affecting to load balancing in cloud. The
study of improving these parameters have great significance to improving system performance through
load balancing. From there, we can propose more effective methods of load balancing, in order to increase
system performance. Therefore, in this paper we researched some parameters affecting the performance
load balancing on the cloud computing.
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
MANET is a temporary connection of mobile nodes via wireless links having no centralized base station.
We developed a protocol with an enhanced route discovery mechanism that avoids the pre-transmission
delay. When a source node wants to communicate with another node, it broadcast RREQ. EAODV give
priority to the source node of real time transmission. When RREQ packet send to neighbor node, for real
time transmission it accept route request on priority basis and the drop ratio of packets decreased, then
throughput increases by receiving more packets at destination and delivery ratio also increased through
these QOS improved.
Qos group based optimal retransmission medium access protocol for wireless se...IJCNCJournal
This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is
designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, shortrange,
low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture,
industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide
autonomous Quality of Service (QoS) to the sensor nodes in one-hop QoS retransmission group and two
QoS groups in WSNs where the source nodes do not have receiver circuits. Hence, they can only transmit
data to a sink node, but cannot receive any control signals from the sink node. The proposed protocol
GORMA provides QoS to the nodes which work independently on predefined time by allowing them to
transmit each packet an optimal number of times within a given period. Our simulation results shows that
the performance of GORMA protocol, which maximize the delivery probability of one-hop QoS group and
two QoS groups and minimize the energy consumption.
Probability Density Functions of the Packet Length for Computer Networks With...IJCNCJournal
The research on Internet traffic classification and identification, with application on prevention of attacks
and intrusions, increased considerably in the past years. Strategies based on statistical characteristics of
the Internet traffic, that use parameters such as packet length (size) and inter-arrival time and their
probability density functions, are popular. This paper presents a new statistical modeling for packet length,
which shows that it can be modeled using a probability density function that involves a normal or a beta
distribution, according to the traffic generated by the users. The proposed functions has parameters that
depend on the type of traffic and can be used as part of an Internet traffic classification and identification
strategy. The models can be used to compare, simulate and estimate the computer network traffic, as well
as to generate synthetic traffic and estimate the packets processing capacity of Internet routers
Analytical Modelling of Localized P2P Streaming Systems under NAT ConsiderationIJCNCJournal
NAT has been design to work with Internet client-server structure. The emerged of Peer-to-Peer (P2P)
networks and applications revealed the incompatibility between P2P applications and NAT. Many methods
has been developed and implemented to solve connectivity between peers behind NAT devices.
Nevertheless, various NATing types can’t communicate with one another. In this work, we are going to
study the impact of NAT types on the start-up delay time of peers in P2P streaming systems. We will
demonstrate the ability of NATing to expel peers in P2P live streaming systems. A new neighbour selecting
algorithm will be proposed. This algorithm will utilize NAT-types configurations as a parameter. We have
utilized NS2 simulator to show the performance of the new algorithm in increasing the connectivity,
reducing the number of expelled peers and implementing of locality.
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGIJCNCJournal
As cloud computing is increasingly transforming the information technology landscape, organizations and
businesses are exhibiting strong interest in Software-as-a-Service (SaaS) offerings that can help them
increase business agility and reduce their operational costs. They increasingly demand services that can
meet their functional and non-functional requirements. Given the plethora and the variety of SaaS
offerings, we propose, in this paper, a framework for SaaS provisioning, which relies on brokered Service
Level agreements (SLAs), between service consumers and SaaS providers. The Cloud Service Broker (CSB)
helps service consumers find the right SaaS providers that can fulfil their functional and non-functional
requirements. The proposed selection algorithm ranks potential SaaS providers by matching their offerings
against the requirements of the service consumer using an aggregate utility function. Furthermore, the CSB
is in charge of conducting SLA negotiation with selected SaaS providers, on behalf of service consumers,
and performing SLA compliance monitoring
A multi tenant platform for sms integrated servicesIJCNCJournal
This paper presents the design and development of a Linux based infrastructure and platform for a
wholesale service provider to offer SMS integrated services to retail providers for resale. The multi-tenant
platform, capable of providing multiple types of SMS integrated services, was designed and built mainly
with off-the-shelf components and open source software. The platform is highly reliable and flexible,
enabling fast provision of customisable services by integrating SMS, voice, VoIP, and web services in
innovative ways. This paper describes the design of the platform and presents four major application areas.
Performance comparison of aodv and olsr using 802.11 a and dsrc (802.11p) pro...IJCNCJournal
A Vehicular Ad Hoc Network (VANET) is a network formed purely among vehicles without presence of any
communication infrastructure as base stations and/or access point. Frequent topological changes due to
high mobility is one of the main issues in VANETs. In this paper we evaluate Ad-hoc On-Demand Distance
Vector (AODV) and Optimized Link State Routing (OLSR) routing protocols using 802.11a and 802.11p in
a realistic urban scenario. For this comparison, we chose five performance metrics: Path Availability, Endto-
End Delay, Number of Created Paths, Path Length and Path Duration. Simulation results show, that for
most of the metrics evaluated, OLSR outperforms AODV when 802.11p and that 802.11p is more efficient
in urban VANETs.
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)IJCNCJournal
Ad hoc networks are a collection of mobile nodes communicating via wireless channels without any fixed
infrastructure. Because of their ease and low cost of building, ad hoc networks have a lot of attractive
applications in different fields. The topology of ad hoc networks changes dynamically, and each node in the
network can act as a host or router. With the increase in the number of wireless devices and large amount
of traffic to be exchanged, the demand for scalable routing protocols has increased. This paper presents a
scalable routing protocol, based on AODV protocol, called the Extended Clustering Ad Hoc Routing
Protocol (ECRP). This is a hybrid protocol, which combines reactive and proactive approaches in routing.
The protocol uses the Global Positioning System to determine the position of certain nodes in the network.
The evaluation methodology and simulation results obtained show that the protocol is efficient and scales
well in large networks
A Compact Dual Band Dielectric Resonator Antenna For Wireless ApplicationsIJCNCJournal
This paper presents the design of a dual band rectangular Dielectric Resonator Antenna (DRA)
coupled to narrow slot aperture that is fed by microstrip line. The fundamental TE111 mode and
higher-order TE113 mode are excited with their resonant frequencies respectively. These
frequencies can be controlled by changing the DRA dimensions. A dielectric resonator with high
permittivity is used to miniaturize the global structure. The proposed antenna is designed to have
dual band operation suitable for both DCS (1710 - 1880 MHz) and WLAN (2400 - 2484 MHz)
applications. The return loss, radiation pattern and gain of the proposed antenna are evaluated.
Reasonable agreement between simulation and experimental results is obtained.
Analysis of Hierarchical Scheduling for Heterogeneous Traffic over NetworkIJCNCJournal
Scheduling real time and non real time packets at network nodes has an important impact by reducing the
processing overhead, queuing delay and response time. Most of the existing packet scheduling algorithms
used in network based on First-In First-Out (FIFO), non-preemptive priority, and preemptive priority
scheduling. However, these algorithms incur a large processing overhead, queuing delay and response
time and are not dynamic to the data traffic changes. In this paper, we present a new hierarchical
scheduling algorithm to assign priority, Hierarchical Hybrid EDF/FIFO which can not only serve the real
time traffic but also provide best effort service to non real time traffic. To examine our approach for
scheduling, we realized our analytical study to express the worst case queuing delay and the worst case
response time for different traffics. The simulation results showed that the Hierarchical hybrid EDF/FIFO
achieved the minimum packet delay and adequate loss packet for non real time traffic when compared with
Hierarchical FIFO. In general, the performances of our approach draw near to Hierarchical EDF which
confirms the effectiveness of this approach.
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
In networks, many application protocols such as CoAP, REST, XMPP ,AMQP have been proposed for IoT communication which includes p2p or S2S. In MANET Network convergence does the way for improvements in Internet of Things (IoT) communication with high potential for a wide range of applications. Each protocol focuses on some aspects of communication in the IoT. Hence, these application protocols have indicated of how IoT has integrated to enhanced and developed of a new service that require to guarantees
the wide range offered by the quality of services. In this paper, we will introduce a smart pathway that can be bridge the gap between IoT services with its real data traffic. Therefore, we enhanced the MANET routing protocol for computing two or more paths to pass the more that one high priority real traffic data via these paths to improve the gloomy picture of this protocol in the context of IoT. In particular, the good services
with high timely delivery of urgent data such as real time data environmental monitoring. After surveying the published and available protocol interoperability given for urban sensing. In this research, we have proposed a novel solution to integrate MANET overlays, and collaboratively formed over MANET, to boost urban data in IoT. Overlays are used to dynamic differentiate and fasten the delivery of high priority real application time data over low-latency MANET paths by integrating with the original specifications. Our experimental results showed the effectiveness on the network such as the overhead and network congestion. In addition, the initial
results of the light-weight improved the routing protocol over the baseline protocols in terms of the delay of reciveing the packets between nodes which lead to increase the throughput by reducing loss packets.
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...cscpconf
In the last decade Peer to Peer technology has been thoroughly explored, because it overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive. In this paper we present algorithms for the construction and the maintenance of a hybrid P2P overlay multicast tree based on topological distances. The essential idea of these algorithms is to build a multicast tree by choosing neighbours close to each other. The topological distances can be easily obtained by the browser using the geolocation API. Thus the implementation of algorithms can be done web-based in a distributed manner. We present proofs of our algorithms as well as practical results and evaluations.
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...journalBEEI
This paper presents a routing performance analysis of structured P2P overlay network. Due to the rapid development and hectic life, sharing data wirelessly is essential. P2P allows participating peers move freely by joining and leaving the network at any convenience time. Therefore, it exists constraint when one measuring the network performance. Moreover, the design of structured overlay networks is fragmented and with various design. P2P networks need to have a reliable routing protocol. In order to analyse the routing performance, this work simulates three structured overlay protocols-Chord, Pastry and Kademlia using OMNeT++ with INET and OverSim module. The result shows that Pastry is the best among others with 100% routing efficiency. However, Kademlia leads with 12.76% and 18.78% better than Chord and Pastry in lookup hop count and lookup success latency respectively. Hence, Pastry and Kamelia architectures will have a better choice for implementing structured overlay P2P network.
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Editor IJCATR
Peer-to-peer (P2P) networks existing on a MANET are a natural evolution since both are decentralized and have dynamic
topologies. As MANETs grow in use due to the increasing popularity of wireless mesh and 4G networks, it is expected that P2P
applications will remain as a popular means of obtaining files. Network coding has been shown as an efficient means of sharing large
Files in a P2P network. With network coding, all file blocks have the same relative importance. This paper presents an efficient
content distribution scheme that uses network coding to share large files in a P2P overlay running on a MANET. Peers request file
blocks from multiple server nodes and servers multicast blocks to multiple receivers, providing efficient multipoint-to-multipoint
communication.
Simulation results show that compared to other common download techniques, the proposed scheme performs very well, having lower
download time and energy consumption. Also, more peers participate in uploading the file, resulting in greater fairness.
Token Based Packet Loss Control Mechanism for NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
The focus of this Paper is the actual implementation of Network Router and verifies the functionality of the
three port router for network on chip using the latest verification methodologies, Hardware Verification
Languages and EDA tools and qualify the IP for Synthesis an implementation. This Router design contains three
output ports and three input ports, it is packet based Protocol. This Design consists Registers and FIFO. For
larger networks, where a direct-mapped approach is not feasible due to FPGA resource limitations, a virtualized
time-multiplexed approach was used. Compared to the provided software reference implementation, our directmapped
approach achieves three orders of magnitude speedup, while our virtualized time multiplexed approach
achieves one to two orders of magnitude speedup, depending on the network and router configuration.
An approximation delay between consecutive requests for congestion control in...IJECEIAES
This research presents a way to avoid network congestion during unicast CoAP-based group communication using increased delays between consecutive requests (DCR) in LoWPAN border routers to limit request send rates. It also provides a way to determine DCR values that are suitable for various network group sizes with differing node counts. The optimal DCR is obtained using the least squares approximation method and the relative minimum. Results from experimentation shows a positive relation, that is, an increase in group size necessitates an increase in DCR value. Experiments in various group sizes show favorable network performance and support the proposed congestion control method using DCR.
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ijcsity
A mobile peer-to-peer computer network is the one in which each computer in the network can act as a
client or server for the other computers in the network. The communication process among the nodes in the
mobile peer to peer network requires more no of messages. Due to this large number of messages passing,
propose an interconnection structure called distributed Spanning Tree (DST) and it improves the efficiency
of the mobile peer to peer network. The proposed method improves the data availability and consistency
across the entire network and also reduces the data latency and the required number of message passes for
any specific application in the network. Further to enhance the effectiveness of the proposed system, the
DST network is optimized with the Ant Colony Optimization method. It gives the optimal solution of the
DST method and increased availability, enhanced consistency and scalability of the network. The
simulation results shows that reduces the number of message sent for any specific application and average
delay and increases the packet delivery ratio in the network.
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
Abstract: For Hybrid wireless network there is need of efficient data routing protocol for improvement of network capability and scalability. By using Distributed Three Hop routing protocol (DTR), we improve capacity of Hybrid network and Reduce overhead. In early Two- Hop Transmission protocol is used for eliminate route maintenance and limited number of hop in routing for Hybrid Wireless Network but it only considers the node transmission within a single cell while DTR can Also deals with Inter-cell communication in real word. DTR is Top-quality from Other routing Protocol to analyses the hybrid wireless networks with the parametric quantity such as throughput, QoS, packet loss, overhead (due to traffic), channel quality, load balancing, routing delivery, scalability and power consumption. DTR also has a congestion control algorithm to avoid load congestion in base station in the case of unbalanced traffic distributions in networks. DTR makes significantly lower overhead by eliminating route monitoring and maintenance. To enhance the efficiency of routing protocol in wireless network Weight Based Data Assignment technique is used for data allocation in distributed routing protocol using the technique of least delay detection to maintain less data congestion in the network . for that DTR divides a message data stream into segments and transmits the segments in a distributed manner.
Keywords: Data Fragmentation, Responses Delay, Hybrid Wireless Network, Three of Routing Protocol, Fuzzy Logic.
Title: Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Author: Amruta A. Mandhare, Kashmira J. Mayekar, Sayali L. Khanekar, Sarika V.Bodake, Sayali S. Bale.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
AN INITIAL PEER CONFIGURATION ALGORITHM FOR MULTI-STREAMING PEER-TO-PEER NETW...ijp2p
The growth of the Internet technology enables us to use network applications for streaming audio and
video.Especially, real-time streaming services using peer-to-peer (P2P) technology are currently
emerging.An important issue on P2P streaming is how to construct a logical network (overlay network) on
a physical network (IP network). In this paper, we propose an initial peer configuration algorithm for a
multi-streaming peer-to-peer network. The proposed algorithm is based on a mesh-pull approach where
any node has multiple parent and child nodes as neighboring nodes, and content transmitted between these
neighboring nodes depends on their parent-child relationships. Our simulation experiments show that the
proposed algorithm improves the number of joining node and traffic load.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Similar to Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution (20)
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
IoT networking uses real items as stationary or mobile nodes. Mobile nodes complicate networking. Internet of Things (IoT) networks have a lot of control overhead messages because devices are mobile. These signals are generated by the constant flow of control data as such device identity, geographical positioning, node mobility, device configuration, and others. Network clustering is a popular overhead communication management method. Many cluster-based routing methods have been developed to address system restrictions. Node clustering based on the Internet of Things (IoT) protocol, may be used to cluster all network nodes according to predefined criteria. Each cluster will have a Smart Designated Node. SDN cluster management is efficient. Many intelligent nodes remain in the network. The network design spreads these signals. This paper presents an intelligent and responsive routing approach for clustered nodes in IoT networks. An existing method builds a new sub-area clustered topology. The Nodes Clustering Based on the Internet of Things (NCIoT) method improves message transmission between any two nodes. This will facilitate the secure and reliable interchange of healthcare data between professionals and patients. NCIoT is a system that organizes nodes in the Internet of Things (IoT) by grouping them together based on their proximity. It also picks SDN routes for these nodes. This approach involves selecting one option from a range of choices and preparing for likely outcomes problem addressing limitations on activities is a primary focus during the review process. Predictive inquiry employs the process of analyzing data to forecast and anticipate future events. This document provides an explanation of compact units. The Predictive Inquiry Small Packets (PISP) improved its backup system and partnered with SDN to establish a routing information table for each intelligent node, resulting in higher routing performance. Both principal and secondary roads are available for use. The simulation findings indicate that NCIoT algorithms outperform CBR protocols. Enhancements lead to a substantial 78% boost in network performance. In addition, the end-to-end latency dropped by 12.5%. The PISP methodology produces 5.9% more inquiry packets compared to alternative approaches. The algorithms are constructed and evaluated against academic ones.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4
Centrality-Based Network Coder Placement For Peer-To-Peer Content Distribution
1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
DOI : 10.5121/ijcnc.2013.5312 157
CENTRALITY-BASED NETWORK CODER
PLACEMENT FOR PEER-TO-PEER CONTENT
DISTRIBUTION
Dinh Nguyen and Hidenori Nakazato
Graduate School of Global Information and Telecommunication Studies
Waseda University, Tokyo, Japan
{nqdinh@fuji., nakazato@}waseda.jp
ABSTRACT
Network coding has been shown to achieve optimal multicast throughput, yet at an expensive computation
cost: every node in the network has to code. Interested in minimizing resource consumption of network
coding while maintaining its performance, in this paper, we propose a practical network coder placement
algorithm which achieves comparable content distribution time as network coding, and at the same time,
substantially reduces the number of network coders compared to a full network coding solution in which all
peers have to encode, i.e. become encoders. Our algorithm is derived from two key elements. First, it is
based on the insight that coding at upstream peers eliminates information duplication to downstream peers,
which results in efficient content distribution. Second, our placement strategy exploits centrality
characteristics of the network topology to quickly determine key positions to place encoders. Performance
evaluation using various topology and algorithm parameters confirms the effectiveness of our proposed
method.
KEYWORDS
peer-to-peer, content distribution, network coding
1. INTRODUCTION
In contrast with the current store-and-forward routing model, network coding [1, 2], a new
approach to maximize throughput in a multicast network,allows network nodes to code, i.e.
generating new information from what they have received, and after that, forward the coded
information into the network. Each time a node wants to send data, it has to, for example, linearly
combine currently available data by a series of numerical multiplications and additions,
consuming certain amount of computational resources. Although having been shown to achieve
maximum multicast throughput [1–3], network coding incurs an expensive computation cost:
practically every node in the network has to code.
In this paper, we study the use of network coding to speed up content distribution in peer-to-peer
(P2P) networks. Our goal is to get the underlying reason for network coding's improved
performance in P2P content distribution and to optimize resource consumption of network
coding.When all peers are allowed to encode, network coding has been shown to significantly
shorten distribution time in peer-to-peer content distribution [4]. As encoding’s complexity and
resource consumption are proportional to the number of encoders1
, the question is “can we
minimize the number of network coders while maintaining the optimal performance of network
coding?”
1 We use the terms network coder and encoder interchangeably in this paper.
2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
158
Instead of requiring all peers to encode, i.e. placing encoders at every peer, we propose a novel
practical algorithm to selectively place network coders at only key locations inside a P2P content
distribution network. The objective is shortest distribution time with constraints on the number of
encoders.
Our placement algorithm, on the one hand, has its roots in the advantage of coding to eliminate
content duplication, which is the cause of performance improvement by network coding. Coding
at an upstream peer can eliminate content duplication over multiple paths to a downstream peer
and result in efficient content distribution. To identify nodes which lie on multiple paths to other
nodes to place network coders, our proposed method, on the other hand, exploits betweenness
centrality [5] and flow centrality[6]to effectively pinpoint the desired key positions in the
network.
Our contributions are
1. we demonstrate that a considerable number of encoders, which means computational
resources, can be saved while still achieving performance comparable to full network
coding where coders are placed at all peers, and
2. we confirm that betweenness centrality and flow centrality are good indicators of where
we can effectively place encoders in a P2P network.
The remaining parts of this paper are organized as follows. We review related work in section 2
and describe our system model and assumptions in section 3. We state our coder placement
problem in section 4 and then go on to investigate block duplication in P2P content distribution in
section 5. Our proposed coder placement algorithm comes in section 6. Section 7 presents
evaluation results. Finally, we conclude the paper in section 8.
2. RELATED WORK
BitTorrent [7], a popular P2P file sharing with parallel downloads to accelerate download speed,
divides the file into equal-size pieces, i.e. blocks, which peers send and receive in parallel,
utilizing both available upload and download bandwidth. Each newly joining peer connects to a
set of random existing peers, such that to construct a mesh overlay network. Furthermore, rarest
blocks are chosen first by receiving peers to quickly disseminate the whole file into the system.
To encourage peers to contribute uploading bandwidth to the system, a peer uploads to a certain
number of neighboring peers at a time, those provide it with best downloading rates.
Network coding [1–4], which allows intermediate nodes to code, have been shown, in theory, to
achieve asymptotically optimal content distribution time. In practice, experimental evidence in [4]
confirms that network coding can remarkably improve BitTorrent file distribution, especially in
clustered topologies where there is limited bandwidth between sets of peers. One interesting
observation is that substantial performance gain is evident even when only the source is allowed
to code, i.e. source coding. Nevertheless, the paper omits concrete explanation for what underlies
network coding’s good performance, and, more interestingly what we can expect if a constrained
number of peers are allowed to encode. In [9, 10], source coding is also applied to improve
BitTorrent without incurring encoding at intermediate peers. Those results suggest full-scale
network coding where all nodes are required to code might be more than what we need to achieve
such performance.
Motivated by the question “can we practically achieve the performance of network coding
without requiring all nodes to encode”, we first identify topological conditions under which
3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
159
coding can increase throughput, and then, given that insight, we furthermore propose a fast,
practical coder placement method that achieves comparable performance in terms of finish time
as network coding while using much less computational resources than network coding does.
Closely related to our work, Kim et al. [11] proposed algorithm to determine a minimal set of
nodes where coding is required to achieve the maximum multicast rate. Their method,
nevertheless, is based on a genetic algorithm, which barely offers any insight into how network
coding improves performance. Bhattad et al. [12] decomposed a multicast solution into flows to
subsets of receivers and construct a linear programming problem for minimal network coding.
Their approach is applicable only in multicast networks with a small number of receivers since
the complexity grows exponentially with the number of receivers. Lun et al. [13] present
methods for computing subgraphs over which network coding is deployed. Their primary concern
is to minimize the cost associated with bandwidth utilization on network links. Moreover, the
model assumes full network coding deployment to achieve maximum multicast rate which is not
suitable in case only a subset of network nodes is allowed to code.Recently, Martalo et al. [14]
figure network coding complexity, i.e.the minimal number of coding nodes, and its relation to the
multicast capacity and the number of receivers in random network topologies. Their evaluation,
however, is limited to the case of acyclic networks which is not applicable in P2P overlay
networks where circles and loops prevail.
In another direction, Small and Li [15], Niu and Li [16], and Crisostomo et al. [17] study network
coding efficiency in different topology settings. More recently, Maheshwar et al. [18] study
network coding in a combination network topology and show that the coding advantage, i.e.
improving multicast throughput, and the cost advantage, i.e. reducing multicast cost, are upper-
bounded by a constant.Unlike them, we aim to locate the best places to assign encoders in any
topology in order to improve performance.
Cleju et al. in [19] propose coder placement algorithms to minimize streaming delay in a push-
based, sender-driven overlay network. The intermediate nodes in their system, however, are not
interested in the content and only act as helpers to the system and their problem is limited to
direct acyclic network topologies. In our system, all peers are receivers who actively select which
parts of the content they want to download. We also do not impose any constraint on the
topologies which practically are random meshes where one peer connects to others at random.
Maymounkov et al. [20], Champel et al. [21], and Silva et al. [22] devise network coding methods
to achieve better computational efficiency. Our solution, nevertheless, will further save
computational resources by reducing the number of encoders.
3. SYSTEM MODEL
3.1. P2P Content Distribution
We consider a P2P content distribution problem from one source to many peers where each peer
maintains overlay links to some other peers at random, i.e. its neighbors, over which data are
transferred.
Since our placement algorithm works on the network topology to find the best places for network
encoders, we assume complete knowledge of the overlay topology and bandwidth capacity of
each overlay link. To capture the essence of network coding in shortening distribution time, we
assume a static scenario, i.e. there is no change in both the physical topology and the overlay
topology during a content distribution session. The insight obtained from this static, centralized
4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
160
case is critically important for future work which investigates the dynamic and distributed
scenarios.
A file exists at a single source and is distributed to all peers which, at the beginning, do not have
any part of the file. The file is divided into K equal blocks, the same as in [7], which are
transferred in the system in parallel.
Whenever a peer has available bandwidth to download, it chooses a number of rarest blocks
within its neighborhood and requests each block from the corresponding neighbor. Based on its
available upload bandwidth and the incentive scheme, the neighbor will permit the download or
not. If a peer fails to request a block from a neighbor, it tries with other neighbors who also have
the block it interests in. If that also fails, the peer will pick up the next rarest block as a substitute.
As in BitTorrent systems [4, 7], block exchange complies with two rules: (1) rarest block first
selection at the receiver’s side: receivers choose rarest blocks within its neighborhood to
download, and (2) an incentive scheme at the sender’s side: senders send blocks to their neighbors
reciprocally.
We consider three scenarios.
1. No coding– coding is not allowed in the system, i.e. all peers send and receive original
blocks as in a pure P2P system. A peer finishes when it has collected all the original
blocks.
2. Network coding– all peers, including the source, are allowed to encode, i.e. combine
downloaded blocks to make new encoded blocks and send to other peers. A peer finishes
when it has collected enough coded blocks required for decoding.
3. Selective coding (proposed) – the same as network coding except that only some chosen
peers, including the source, are allowed to encode.
Selective coding may require a centralized server for coder assignment. We leave that
implementation issue for future work and focus hereafter on where to place coders.
We assume an altruistic system where peers stay and forward blocks even after they have finished
downloading. The source does also stay in the system until all peers finish.
3.2. Random Linear Network Coding
When a chosen peer is allowed to code, or in other words, a coder is placed at the selected peer,
the peer uses random linear network coding (RLNC) [3, 8] to create new coded blocks from the
blocks it has received.
Using RLNC, an encoding vector of K coefficients is attached to each coded block to specify how
that coded block is generated from the K original blocks. The coded block together with its
encoding vector is then sent to the requesting peer. As in [4], in our system, before requesting a
coded blocks, peers check the encoding vector of that block to verify if it is linearly independent
to what they have in order to avoid downloading duplicated meaningless blocks.
In case of selective coding where some nodes encode and the others do not, receiving peers prefer
coded blocks over non-coded, original ones. The reason is because coded blocks, created by
randomly combining multiple blocks, can improve throughput by eliminating block duplication as
we discuss later.
5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
161
After a peer collects K independent coded blocks, i.e. the K associated encoding vectors form a
full-rank matrix, it can decode to get the K original blocks, i.e. the original file, by solving the set
of K linear equations.
4. CODER PLACEMENT PROBLEM
Network coding’s optimality does not come without a price: every node has to encode, i.e.
become a coder. Our goal is to maintain the optimality of network coding while substantially
reducing the number of coders.
Assuming the system uses random linear coding, the encoding complexity of the system is
O(CFK) where C is the number of encoders in the system, K is the number of original blocks, and
F is the file size. Since F is fixed for a given file, and K cannot be set too low, it is important to
minimize the number of coders to reduce the encoding complexity.
Peers in the P2P network form a directed overlay topology, i.e. directed graph G = {V, E} where
V is the set of peers, or nodes, and E is the set of directed overlay links between peers. Our coder
placement problem can be stated as follows.
Given a P2P content distribution which is defined by
• a network topology G = {V, E},
• a source in V with a file of size F to be distributed to all peers, and
• a number C (1 ≤ C ≤ |V|),
where in the network topology can we place C coders in order to shorten distribution time the
most?
Since our problem is as hard as the problem of finding a placement with shortest finish time and
minimum number of coders which is proved to be NP-hard [23], we aim at heuristic placements
which exploit the characteristics of the network topology.
In the next section, we discuss the block duplication phenomenon observed in pure, non-coding
BitTorrent systems which is the rationale behind our proposed coder placements to eliminate the
duplication.
5. BLOCK DUPLICATION IN BITTORRENT
Peers in pure BitTorrent choose blocks to download in a distributed manner based on their own
perception that those blocks are rare in the neighborhood. Without a global knowledge, when
there are multiple downstream paths to a particular node, some blocks are downloaded multiple
times by upstream peers on those paths, which results in insufficiency of new information flow
coming to the downstream node. Because of duplicated data, the downstream node cannot utilize
its full downloading capacity. This duplication phenomenon has been illustrated in [1, 4].
Nevertheless, in this section, we distinctively figure how much duplication a given node
generates, which is the foundation of our proposed coder placement.
A path, without circles or loops, from node i to node j is a sequence of nodes starting from i and
terminating at j in which two adjacent nodes are connected by a link. A flow on a path from node
i to node jis a mapping E→R+
which conforms to capacity constraint of each link and flow
6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
162
conservation at each node on the path. A max-flow is the flow with maximum value. Figure 1
illustrates two paths connecting node i and node j: path 1 and path 2 with two respective flows of
p1 and p2.
Denote N(t) as the total number of blocks available at node i by time t. Since nodes on one path
do not know which blocks have been chosen by nodes on the other path, we can assume blocks
are picked up at random: p1t random blocks are chosen from N(t) to transmit on path 1, and
likewise, p2t random blocks are transmitted on path 2 by time t. The expected number of
duplicated blocks transmitting on the two paths, therefore, is
.
.
The total number of non-duplicated blocks from node i which are delivered to node j by time t is
(1)
Let si be the rate at which blocks coming to node i, we have the number of blocks available at
node i by time t: . From (1), the effective throughput (averaged over time t) from node
i to node j is
(2)
By the same reasoning, (2) can be generalized to get the effective bandwidth in case there are m
paths connecting node i and node j
. .
. .
. .
. .
1 . .
.
(3)
Equation (3) reveals that due to duplicated blocks on the paths, the effective throughput peff is
smaller than the total flows on all paths from node i to node j:
. . (4)
Figure 1.Two paths connect node i and node j.
7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
163
wherer>0 is the duplication rate.
From (3) and (4), we have
. . . .
. .
1 . .
. (5)
There are two observations on the correlations of duplication rate r with consisting flows which
contribute to the creation of our coder placement algorithms.
First, duplication rate is higher with larger consisting flows. If we consider a given flow pi
separately and fix all other flows, (5) can be converted to
(6)
whereAi and Bi are independent from pi, and Ai>0, Bi>0. Equation (6) shows the correlation of
duplication rate and each separate flow from node i to node j: when a given flow pi increases,
duplication rate r also increases.
Second, duplication rate is higher if there are more flows from node i to node j. Let r(m) and
peff(m) respectively be the duplication rate and effective throughput with m flows from node i to
node j: p1, p2,.., pm and r(m+1) be the duplication rate when a new flow pm+1is added. It is easy to
see that
1
.
(7)
which means 1 .
Therefore, we have
Figure 2. Duplication rate increases with flow size and number of flows.
8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
164
. (8)
We illustrate the correlation in Figure 2(a) when there are 3 flows p1, p2, and p3 from node i to
node j: si=8, p1= p2=2 and p3 changes from 1 to 4. In Figure 2(b), we fix si=6, p1= p2=1 and add
more flows with bandwidth equal to 1 to change the number of flows m from 2 to 6.
6. PROPOSED CODER PLACEMENTS
6.1. Coding at the Network Centrality
As shown in section 5, we can achieve high throughput, and thus, short distribution time by
eliminating block duplication. Since block duplication happens on multiple delivery paths, to
optimize the whole system, our job is to find a set of C nodes, from which duplicated blocks slow
down throughput to other nodes the most. One such algorithm (Algorithm 1), which figures all
possible path from the source to a downstream node, is given for reference. Algorithm 1’s
running time, however, is prohibitive due to the exponential number of paths.
Algorithm 1. Multi-path Coder Placement Algorithm
1. For each node i, R(i)=0.
2. For each node j, figure all paths from the source to j.
a. Get the set A of all node i, i is on multiple paths to j.
b. For each i AR(i)= R(i)+ri, where ri is computed using
(5)
3. Assign a set of C nodes with highest R() value as coders.
We propose a heuristic approach instead by quickly looking for nodes which lie on more paths
with wider bandwidth. By ensuring that chosen coders lie on paths to many nodes with wider
bandwidth we can avoid duplicated blocks from transferring to those nodes as shown in section 5.
Our idea is to use betweenness centrality (we will explain shortly) to evaluate how important a
node to other nodes if that node becomes a coder. The higher a node’s betweenness centrality
value, the more paths or wider paths between other nodes it stands on, and the more appraisable
for it to become a coder. Algorithm 2 summarizes our coder placement strategy.
Note that the source is always chosen as a coder because it stands on paths to every peer. The
algorithm utilizes either betweenness centrality [5], or its variant, flow centrality [6] to figure the
importance of a given network node which we explain in the following section.
6.2. Betweenness and Flow Centrality
Originated in social networks studies, centrality is an essential tool for graph analysis which
measures the importance of a node within the graph. Depending on the kind of measures, there
are various centrality indexes. In this paper, however, we are interested in betweenness centrality,
and one of its variants: flow centrality.Betweenness centrality expresses the degree a node locates
on the paths between other nodes, and flow centrality expresses the total bandwidth
9. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
165
Algorithm 2. Proposed Coder Placement Algorithm
1. Compute centrality of every peer using either of following algorithms
a. Brandes’s betweenness centrality algorithm [27]
b. Flow centrality algorithm based on Edmond-Karp’s max flow
(Algorithm 3)
2. Appoint C peers with highest centrality values as coders.
of flows going through a node. That is, betweenness centrality and flow centrality are indicators
of nodes fromwhich duplication occurs. Given that network coding, by generating fresh encoded
data to send onto each path, can effectively eliminate such duplication to increase effective
bandwidth, placing coders in nodes with high centrality values will speed up content delivery.
Betweenness centrality [5] measures the degree that a node stands on the shortest paths between
other nodes, which has been applied in different contexts such as routing and cache placement [24,
25] to place a network function in a set of nodes. Since we are interested in distributing data from
the source to all peers, all shortest paths under consideration are from the source to other nodes.
Denote as the number of the shortest paths from the source to node k and as the number
of the shortest paths from the source to node k which go through node i. Betweenness centrality
of node i is measured by
.
(9)
Nodes with high betweenness centrality locate on more shortest paths to other downstream nodes,
and thus, likely generate more duplication as we observe in section 5, (8). If those nodes encode,
more duplication can be avoided to speed up content distribution. The limitation of betweenness
centrality is that it only considers the number of shortest paths to downstream nodes which does
not always reflect correctly the importance of a node in eliminating duplication.
Flow centrality [6], on the other hand, measures the portions of max-flows between all pairs of
other nodes which go through a given intermediate node. Like betweenness centrality, we are
interested in flows from the source to all peers. In our study, we compute flow centrality of node i
as the total amount of flows from the source to all other node k which pass through node i:
, , (10)
whereS is the source, and , , is the portion of max-flow from the source to node k that
passes through node i. As we are interested in both the value of the flow and the shortness of
thepath, the max-flow mentioned above is the one consists of paths with shortest lengths among
all paths from S to node k.2
2
This kind of flow centrality is slightly different from what has been originally proposed in [6] where
, , means the portion of max-flow from node S to node k that must pass through node i in order that
10. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
166
High flow centrality nodes have larger aggregate flows to downstream nodes. They, therefore,
have high probability to stand on more paths to a given downstream node, and in addition, the
flows on the paths are likely larger. Since larger duplication results from larger flows as stated in
section 5, we expect high flow centrality nodes to generate more duplication to downstream
nodes, which justifies the need to place encoders there.
We compute flow centrality using Algorithm 3 which is basically Edmond-Karp’s max-flow
algorithm [26] with the addition of line 31 where the augmenting flow value (flow) is updated to
the flow centrality CF[i] of each node i on that augmenting path.
Algorithm 3. Flow Centrality Algorithm based on Edmond-Karp’s
Max Flow
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
CF[i] = 0, i V;
u[i,j] = capacity of link (i,j), (i,j) E;
s = 0;
for t V do
f[i,j] = 0, (i,j) E;
do
Q ← empty queue;
prev[0] = -1;
color[i] = not visited, i V;
enqueue s → Q;
while Q not emptydo
dequeue i ← Q;
color[i] = visited;
foreach neighbor j of i do
if(color[j]==not visitedand (u[i,j]-f[i,j])>0)
color[j] = queued;
prev[j] = i;
enqueue j → Q;
end
end
end
if(color[t]==visited)
for(j=t; prev[j]>=0;j=prev[j]) do
i = prev[j];
flow = min{u[i,j]-f[i,j]};
end
for(j=t; prev[j]>=0;j=prev[j]) do
i = prev[j];
f[i,j] = f[i,j]+ flow;
f[j,i] = f[j,i]- flow;
CF[i] = CF[i]+ flow;
end
end
while(color[t]==visited)
end
node k achieves its max-flow. In other words, if node i is removed, the max-flow from node S to node k
decreases by , , .
11. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
167
Betweenness centrality of all nodes can be computed with Brandes’sO(VE) algorithm [27]. Since
we are only interested in shortest paths from the source, the complexity is O(E). Flow centrality,
however, is more expensive to compute. In Algorithm 3, the complexity to visit each source-sink
pair is O(VE2
). Therefore, to find out flow centrality of all V nodes, the algorithm takes O(V2
E2
)
time.
6.3. Discussion on Algorithms for Dynamic Networks
One straightforward way to extend our proposed placement to the dynamic case, where peers
keep joining and leaving the system, is to redeploy encoders periodically.
A more elegant extension is to use a distributed approximation algorithm, such as [28, 29], to
compute the centrality value at each peer. Using the method in [28], for example, an
alternativecentrality value called second order centrality is computed by letting each node keep
track of the time elapsed between visits by a random walk. High centrality nodes see more
frequent visits compared with other nodes. The approach in [29], on the other hand, figures the
centrality level of a node by means of a localized spectral analysis on a small-size neighborhood
of the node.
In this paper we focus more on finding the feature of network coding which helps accelerate
content distribution rather than applying it in a real application. We thus leave the extension to
dynamic networks for future work.
7. EXPERIMENTAL EVALUATION
We implemented a C++ simulator of the P2P content distribution system described in section 3
and run simulations over generated topologies distributing a file from the source to all
participating peers. The file is divided into smaller fix-sized parts, i.e. blocks. The source and all
peers exchange blocks until all peers acquire enough blocks to construct the original file; then the
simulation finishes.
The simulations are round-based. Each peer chooses blocks to download according to its available
bandwidth, rarest block first selection, and the incentive scheme in the beginning of each round.
The chosen blocks are downloaded by the peer at the end of the round and then the system moves
to next round. After a peer has collected enough blocks, it stops downloading but keeps staying in
the system to serve other peers. A link capacity is measured by block per round, i.e. how many
blocks can be transferred through the link in a round. We disregard the negligible overhead of
sending encoding coefficients associated with random linear coding in our simulations.
We implemented mutual exchange incentive scheme in the simulations: when there is contention
for uploading, a sending peer preferably uploads to the neighbors from whom it is also
downloading. After such peers are exhausted, other neighbors are chosen for upload. This kind of
incentive schemes has previously been used in [4]. In addition, to ensure that the source quickly
disseminates new blocks into the network, we enforce at the source a scheme which works like
the super seeding scheme [30]. Each time there is a request for download, the source tries to serve
with a random block which has never been sent into the network.
12. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
168
For each overlay topology, with the same simulation parameters, we run simulations 100 times3
distributing a 200-block file from the source and collect the average finish time of all peers in
each of the 3 scenarios: no coding, network coding, and selective coding when we use
betweenness centrality and flow centrality to place coders.
7.1. BitTorrent Block Duplication Validation
We first set up an experiment to verify block duplication phenomenon in BitTorrent and to show
network coding effectiveness in eliminating that duplication. The topology given inFigure 3 is
used for simulations to investigate block duplication on the two paths: path 1 is from node i to
cluster 1 then cluster 2, and path 2 starts at node i to cluster 2 then cluster 1. Each cluster has
1000 peers which are arranged in a regular random topology. All other overlay links within a
cluster have the same capacity of 1 block per round. We change the bandwidth p from node i to
each cluster and the bottleneck bandwidth b between clusters. The source bandwidth is twice the
bandwidth from node i to each cluster.
Every block sent from node iis reported by the simulator. Using the same simulation parameters,
we measure the number of duplicated blocks in 3 cases:
no coding: if a block is transferred c times from node i, it means there are (c-1) duplicated
blocks,
node i coding (an encoder is placed at node i): if a (coded) block sent by node i is linearly
dependent on blocks which it has already sent, that block is considered a duplicated one,
and
network coding (encoders are placed at all nodes): duplicated blocks are measured as in
the case node i codes.
As we expected, block duplication only happens in no coding case (Figure 4). There are always a
large number of duplicated blocks transmitting through the two paths from node i while in the
other two cases, that number is almost zero. One observation is that the number of duplicated
blocks is higher with wider bandwidth from node i (Figure 4(a)). Block duplication is also more
severe when bottleneck between the two clusters has narrow bandwidth (Figure 4(b)).
3
Although simulation parameters are the same for 100 runs, due to randomness in downloader selection by
the sending peers and block selection by the receiving peers, the result changes with each run.
Figure 3.A topology with 2 paths from node i
13. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
169
7.2. P2P Network Topology
We use Watts and Strogatzsmall-world network model [31] to generate topologies for
simulations. The reason is twofold. First, several real-life networks, including P2P overlays,
have been reported to exhibit properties of small-world networks [32, 33]. Second, small-world
model has a parameter to tune the severity of bottleneck links as explained below.
Nodes in a small-world network are, at the beginning, organized in a ring lattice, each node
connects to a predetermined number of nearby nodes, i.e. degree d. The links between nodes are
then rewired with some probability prw, i.e. one endpoint of the (randomly chosen) link is rewired
to a new random node, to create shortcuts.
Shortcuts connect different parts of the networks where quite different collections of data blocks
exist. Those shortcuts, to a certain extent, equivalent to bottleneck links because the total flow of
nearby regular links is bigger than the capacity of the single shortcut link. By adjusting the
rewiring probability, we can tune the severity of the bottlenecks. Lower rewiring probabilities
mean fewer shortcuts, which in turn mean the bottlenecks are more severe because there are fewer
shortcut links for transferring data between different parts of the network. In simulations, we set
degree d=6 and change the rewiring probability. All overlay links have capacity of 1 block per
round.
7.3. Coder Placement Evaluation Results
Figure 5 compares the performance of the proposed placement algorithm with full network
coding. Assigning C=1000 peers with highest flow centrality as coders, we can achieve
comparable performance to network coding. The average finish time is consistently under 5%
longer than network coding. Using betweenness centrality to appoint the same number of coders
with highest betweenness centrality values, the finish time is nearly 15% longer than network
coding when the topologies have low rewiring probability (prw=0.02 and prw=0.1) and 5% longer
than network coding with higher rewiring probabilities. The reason for flow centrality’s good
performance is that, by taking max-flow into account, it reflects more accurately the
characteristics of the topology than betweenness centrality. The complexity of flow centrality is,
however, higher than betweenness centrality. For comparison, degree-based placement, i.e.
encoders are placed at high-degree nodes first, has poor performance. We notice that the
(a) Number of duplicated blocks (p varies) (b) Number of duplicated blocks (b varies)
Figure 4. Number of duplicated blocks
14. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
170
performance gain due to coding is negligible (even with full network coding) in regular
topologies (prw=0) and highly random topologies (prw>0.5) because there are virtually no
bottlenecks in such networks.
We change parameter C to appoint different numbers of peers with highest centrality values as
coders in a topology with 5000 peers and rewiring probability prw=0.02. Figure 6 gives the
average finish time when no coders (no coding) to 5000 coders (full network coding)4
are
deployed. We also include the finish time of random placement, which assigns the encoders at
random, and degree-based placement for reference. Betweenness centrality and flow centrality
placements always achieve improved performance compared with degree-based and random
4
Using a given placement method, increasing the number of encoders to 5000 means that all peers in the
network encode, i.e. network coding. Therefore, in Figure 6, finish time is the same for all 4 placement
methods when the number of encoders is 5000.
Figure 5.Finish time compared with full network coding.
Figure 6.Finish time with different numbers of encoders.
15. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
171
placements. Of the two former methods, flow centrality reaches finish time almost equal to
network coding with only 1000 encoders and the performance is nearly constant when we
increase the number of coders from 1000 to 5000. The result confirms that centrality is good tool
to locate a small subset of important nodes for coder placement.
We furthermore evaluate the placement method in terms of total number of required encoders and
average finish time, varying the centrality threshold. With each threshold, all nodes with
centrality value higher than or equal to the threshold are chosen as encoders. The results are given
in Figure 7 and Figure 8 in which threshold α=0 means all nodes are chosen as encoders, i.e.
network coding, and threshold infinity means no nodes code, i.e. no coding. In the given topology
Figure 7. Finish time and number of assigned encoders with
different betweenness centrality thresholds.
Figure 8. Finish time and number of assigned encoders with
different flow centrality thresholds.
16. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
172
(d=6, prw=0.02), choosing all nodes with betweennesscentrality higher or equal to αb=10, which
means the total fractions of shortest paths to downstream peers the selected encoders locate on are
equal to or greater than 10, gives an average finish time 14% longer than network coding,
however, with a saving of nearly 85% in the number of required encoders compared to network
coding (Figure 7). The performance is better using flow centrality. When threshold is set to
αf =180, i.e. each chosen encoder stands on a total flow of 180 to its downstream peers, with
nearly 90% saving in encoders, flow centrality placement achieves short finish time, just 7%
longer than network coding finish time (Figure 8). With lower thresholds, i.e. more nodes are
chosen as encoders, there is not much improvement in finish time, even though the number of
encoders is much higher. The result means that while encoders at high centrality nodes can
effectively improve performance, those at low centrality nodes are redundant and can be removed
to save resources.
8. CONCLUSIONS
In this paper, we have proposed a novel practical algorithm to place coders within a P2P network
to shorten distribution time. Unlike previous approaches which justify coding over the whole
network topology, our algorithm, in evaluating the centrality value of each node within the
topology, looks inside the network to find particular places which require network coding. The
idea works on the basis that coding at an upstream peer can improve data transmission on
multiple paths to downstream peers located behind bottlenecks. Data redundancy generated by a
coder eliminates duplicated downloads, which otherwise unnecessarily consume bandwidth
resources and slow down content delivery over the bottleneck.
Our content distribution has comparable performance to network coding, yet with far fewer
coders, using much less computational resources compared to network coding which excessively
codes everywhere.
We have confirmed that betweenness centrality and flow centrality are good indicators to locate
important nodes, which lie on multiple paths to other nodes, in a network and deploy them as
coders. Flow centrality, by taking flow information into account, achieves a performance closely
matched that of full network coding. Betweenness centrality placement, although less effective,
has the advantage of much lower complexity which is suitable when encoder placement is
frequently computed.
For our future work, we plan to extend our algorithm to the dynamic case when peers join and
leave the system. As we have discussed in section 6.3, that can be done by, first, devising a
distributed algorithm to allow each peer to figure an approximate centrality value by itself which
is then used to decide if the peer should encode or not. Second, we would need to determine the
centrality threshold which both achieves short finish time and reduces the number of encoders.
Peers with centrality values higher than the threshold will become network coders to improve the
system performance.
ACKNOWLEDGEMENTS
This work was supported by JSPS KAKENHI Grant Number (24500098).
17. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
173
REFERENCES
[1] R. Ahlswede, N. Cai, S. R. Li, and R. W. Yeung, “Network Information Flow,” IEEE Trans. on
Information Theory, July 2000.
[2] S. Li, R. Yeung, and N. Cai, “Linear network coding,” IEEE Transactions on Information Theory,
2003.
[3] T. Ho, R. Koetter, M. Medard, D. Karger, and M. Effros, “The Benefits of Coding over Routing in
a Randomized Setting,” ISIT, Yokohama, Japan, 2003.
[4] C. Gkantsidis and P. R. Rodriguez, “Network Coding for Large Scale Content Distribution,” IEEE
INFOCOM, March 2005.
[5] L.C. Freeman, “A set of measures of centrality based on betweenness,” 1977, Sociometry, vol. 40,
No. 1, 35-41.
[6] L.C. Freeman, S.P. Borgatti, D.R. White, “Centrality in valued graphs: a measure of betweenness
based on network flow,” Social Networks 13, 141–154, 1991.
[7] B. Cohen, “Incentives Build Robustness in BitTorrent,” P2P Economics Workshop, 2003.
[8] P. Chou, Y. Wu, and K. Jain, “Practical network coding,” in Proc. Annual Allerton Conference on
Communication, Control and Computing, 2003.
[9] T. Locher, S. Schmid, and R. Wattenhofer, “Rescuing Tit-for-Tat with Source Coding,” IEEE P2P,
Sep. 2007.
[10] D. Nguyen, H. Nakazato, “Peer-to-Peer Content Distribution in Clustered Topologies with Source
Coding,” IEEE GLOBECOM 2011, Houston, USA, Dec. 2011.
[11] M. Kim, M. Medard, V. Aggarwal, U.-M. O'Reilly, W. Kim, C. W. Ahn, and M. Effros,
“Evolutionary Approaches to Minimizing Network Coding Resources,” Proc. IEEE INFOCOM
2007, May 2007.
[12] K. Bhattad, N. Ratnakar, R. Koetter, and K. R. Narayanan, “Minimal network coding for
multicast,” Proc. IEEE ISIT 2005, Sep. 2005.
[13] Desmond S. Lun, NiranjanRatnakar, Ralf Koetter, Muriel M´edard, Ebad Ahmed, and Hyunjoo
Lee, “Achieving Minimum-Cost Multicast: A Decentralized Approach Based on Network
Coding,” IEEE INFOCOM 2005, Mar. 2005.
[14] M. Martalo, M. Mohorovicich, G. Ferrari, C. Fragouli, “Network-coded multihop multicast:
Topology and encoding complexity,” IEEE International Conference on Communications (ICC),
June 2012.
[15] T. Small, B. Li, “Topology Affects the Efficiency of Network Coding in Peer-to-Peer Networks,”
ICC 2008, May 2008.
[16] D. Niu, B. Li, “Topological Properties Affect the Power of Network Coding in Decentralized
Broadcast,” IEEE INFOCOM 2010, Mar. 2010.
[17] S. Crisostomo, J. Barros, C. Bettstetter, “Network Coding with Shortcuts,” IEEE ICCS 2008.
[18] S. Maheshwar, Zongpeng Li, Baochun Li, “Bounding the Coding Advantage of Combination
Network Coding in Undirected Networks,” IEEE Transactions on Information Theory, vol.58,
no.2, pp.570–584, Feb. 2012.
[19] N. Cleju, N. Thomos, P. Frossard, “Network Coding Node Placement for Delay Minimization in
Streaming Overlays,” ICC 2010, May 2010.
[20] P. Maymounkov, N.J.A. Harvey, D.S. Lun, “Methods for efficient network coding,” in Proc. 44th
Annu. Allerton Conf. Communication, Control, and Computing, Monticello, IL, September 2006.
[21] M.L. Champel, K. Huguenin, A.M. Kermarrec, N. Le Scouarnec, “LT Network Codes,”
Distributed Computing Systems (ICDCS), June 2010.
[22] D. Silva, Weifei Zeng, F.R. Kschischang, “Sparse network coding with overlapping
classes,”NetCod '09, June 2009.
[23] M. Langberg, A. Sprintson, and J. Bruck, “The encoding complexity of network coding,” IEEE
Trans. on Information Theory, pp. 2386–2397, June 2006.
[24] Ali Tizghadam, and Alberto Leon-Garcia, “AORTA: Autonomic Network Control and
Management System,” 1st IEEE Workshop on Automated Network Management, Apr. 2008.
[25] Diliang He, Wei K. Chai and George Pavlou, “Leveraging In-network Caching for Efficient
Content Delivery in Content-centric Network,” London Communication Symposium, Sep. 2011.
[26] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, “Introduction to Algorithms,” second
ed., MIT Press and McGraw–Hill, ch. 26.2, 2001, pp. 660–663.
18. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
174
[27] U. Brandes, “A Faster Algorithm for Betweenness Centrality,”Journal of Mathematical Sociology,
2001.
[28] A.-M. Kermarrec, E.L. Merrer, B. Sericola, and G. Trédan, “Second order centrality: Distributed
assessment of nodes criticity in complex networks,” Computer Communications 34 (2011) 619–
628.
[29] K. Wehmuth and A. Ziviani, “Distributed Location of the Critical Nodes to Network Robustness
based on Spectral Analysis,” the 7th Network Operations and Management Symposium
(LANOMS), Oct. 2011.
[30] BitTornado. About Super-seed Mode [Online]. Available:
http://www.bittornado.com/docs/superseed.txt
[31] Watts, Duncan J., Strogatz, Steven H. (June 1998) “Collective dynamics of 'small-world'
networks,” Nature 393 (6684): 440–442.
[32] L. A. Adamic, “The Small World Web,” in proceedings of ECDL '99, Springer-Verlag, London,
UK, 443–452.
[33] N Leibowitz, M. Ripeanu, A. Wierzbicki, “Deconstructing the kazaa network,” in proceedings of
WIAPP 2003.
Authors
Dinh Nguyen received his Bachelor of Electronics and Telecomm. degree from Hanoi University of
Technology, Vietnam, in 1999. From 1999 he was with NetNam ISP Corporation. He received his MSc and
currently is a Ph.D. candidate at Graduate School of Global Information and Telecommunications Studies,
Waseda University, Tokyo, Japan. His research interests include peer-to-peer systems, network coding, and
content distribution systems.
Hidenori Nakazato received his B. Engineering degree in electronics and telecommunications from
Waseda University in 1982 and his MS and Ph.D. degrees in computer science from University of Illinois
in 1989 and 1993, respectively. He was with Oki Electric from 1982 to 2000. Since 2000, he has been a
faculty member of Graduate School of Global Information and Telecommunications Studies, Waseda
University. He served as the editor of IEICE Transactions on Communications from 1999 to 2002 and
other positions in the executive committee of IEICE Communication Society from 1997 to 2004, and from
2008 to now. He also served as an executive committee member of IEEE Region 10 and is serving as a
member of several IEEE Member and Geographic Activity committees. His research interests include
performance issues in distributed systems and networks. He is a member of ACM, IEEE, and IPSJ.